Difference between revisions of "esswn"
(New page: '''Efficient and Secure Streaming of Scalable Multimedia Content over Wireless Networks''' In this project, we design novel algorithms and systems to optimize the efficiency and enhance ...) |
|||
Line 1: | Line 1: | ||
− | |||
'''Efficient and Secure Streaming of Scalable Multimedia Content over Wireless Networks''' | '''Efficient and Secure Streaming of Scalable Multimedia Content over Wireless Networks''' | ||
Line 26: | Line 25: | ||
* [[Private:sip_botnet| Detection of Botnets Mounted on the Session Initiation Protocol (login required)]] | * [[Private:sip_botnet| Detection of Botnets Mounted on the Session Initiation Protocol (login required)]] | ||
− | * [[Private:hybrid | Hybrid Multicast-Unicast Multimedia Streaming over 3G/4G Networks (Login Required)]] | + | * [[Private:hybrid | Bandwidth and Energy Saving using Hybrid Multicast-Unicast Multimedia Streaming over 3G/4G Networks (Login Required)]] |
* [[Private:wimax_testbed| WiMAX Testbed Design (login required)]] | * [[Private:wimax_testbed| WiMAX Testbed Design (login required)]] |
Revision as of 12:45, 19 March 2011
Efficient and Secure Streaming of Scalable Multimedia Content over Wireless Networks
In this project, we design novel algorithms and systems to optimize the efficiency and enhance the security of broadband wireless networks that cover large geographical areas and carry multimedia traffic. Examples of these networks include 3G and 4G cellular networks and IEEE 802.16 (WiMAX) networks. We design optimal transmission schemes of multimedia streams that minimize the energy consumption of mobile devices as well as minimize the bandwidth utilization of the wireless spectrum.
To enhance the security, we address one of the most serious security threats for the wireless infrastructure, which is the exploitation of mobile devices to create malicious botnets. A botnet is a set of compromised devices controlled by remote attackers and used to launch malicious activities such as denial of service attacks and distributing spam emails. We design algorithms to detect the existence of botnets created over mobile devices that are participating in multimedia services, and we develop security schemes to prevent these botnets from forming again as well as to dismantle them if they occur. We focus on botnets that could exploit the session initiation protocol (SIP) for coordinating the compromised devices and launching attacks. SIP is an important component of the IP multimedia subsystem and it is deployed on many mobile phones.
People
- Ahmad AbdAllah Hassan
- Islam Elmaddah
- Saleh Almowuena (PhD student)
- Mohammad Alkurbi (MSc student)
Research Problems and Ideas
References and Links
- Adding Video Traces Data to OPNET Simulation
- WiMax, DHCPv6 implementation in Omnet++
- WiMAX TV from NextWave MXtv utilizes macro-diversity technology to deliver optimal performance and does not require operators to acquire additional spectrum to enter the mobile TV market
- WiMax in the field Clearwire's equipments in the field
- WiMax Test Drive, Clearwire’s Barry Davis demonstrates the mobile WiMax/Wi-Fi router
- Multimedia Application Performance on a WiMAX Network
- TV Over Net Web site
- Cellualr News, Up to 12% of DSL Broadband users to switch to WiMAX within five years.
- Sprint spins off WIMAX unit into new Clearwire, 7 May 2008. Sprint, Clearwire, Intel, Google and others form a partnership to promote WiMAX.
- J. Wang, M. Venkatachalam, and Y. Fang, System Architecture and Cross-Layer Optimization of Video Broadcast over WiMAX, IEEE JSAC 25(4), pp. 712--721, MAY 2007. (Check this special issue of JSAC as well.)
- XOHMTM mobile 4G service WiMAX deployment by Sprint [1] (First pay-per-use WiMAX service offered in Baltimore, 2 to 4 megabits per second)
- WiMAX 802.16e Mobile Handoffs. Motorola Demonstrates World's First WiMAX 802.16e Mobile Handoffs in Downtown Chicago
- S. Ahson and M. Ilyas, The WiMAX Handbook, CRC Press, 2008. Three volumes. V1: Technologies, Performance Analysis, and QoS. V2: Standards and Security. V3:Applications, eCopy of V3 through SFU Library.